Defensive Security Podcast Episode 196

http://www.databreachtoday.com/notpetya-patient-zero-ukrainian-accounting-software-vendor-a-10080

http://blog.talosintelligence.com/2017/07/the-medoc-connection.html?m=1

http://www.databreachtoday.com/police-seize-backdoored-firms-servers-to-stop-attacks-a-10083

https://www.bleepingcomputer.com/news/security/m-e-doc-software-was-backdoored-3-times-servers-left-without-updates-since-2013/

https://www.wired.com/story/petya-plague-automatic-software-updates/

https://www.theregister.co.uk/2017/06/28/petya_notpetya_ransomware/https://apnews.com/962db1cd370d4fdda6083d064b94dd1b

https://infosec.engineering/notpetya-complex-attacks-and-the-fog-of-war/

Defensive Security Podcast Episode 195

http://securityaffairs.co/wordpress/60243/data-breach/dra-data-leak.html

https://www.wired.com/story/crash-override-malware/

https://threatpost.com/fin10-extorting-canadian-mining-companies-casinos/126382/

http://variety.com/2017/digital/features/netflix-orange-is-the-new-black-leak-dark-overlord-larson-studios-1202471400/amp/

https://arstechnica.com/information-technology/2017/06/32tb-of-windows-10-beta-builds-driver-source-code-leaked/

https://arstechnica.com/security/2017/06/5-weeks-after-wcry-outbreak-nsa-derived-worm-shuts-down-a-honda-factory/

Defensive Security Podcast Episode 194

https://hotforsecurity.bitdefender.com/blog/heartbleed-still-hurting-hard-uk-council-fined-100000-after-data-breach-18205.html

https://threatpost.com/ransomware-attack-hobbles-prestigious-university-college-london/126299/

http://www.securityweek.com/web-hosting-provider-pays-1-million-ransomware-attackers

https://infosec.engineering/improving-the-effectiveness-of-vulnerability-remediation-targeting/ 

Defensive Security Podcast Episode 193

http://www.csoonline.com/article/3198492/security/ceos-risky-behaviors-compromise-security.html

https://www.bleepingcomputer.com/news/security/ex-admin-deletes-all-customer-data-and-wipes-servers-of-dutch-hosting-provider

http://thehackernews.com/2017/06/intel-amt-firewall-bypass.html

http://thehackernews.com/2017/06/microsoft-powerpoint-malware.html

Defensive Security Podcast Episode 192

http://www.csoonline.com/article/3198496/compliance/sometimes-it-is-necessary-to-bend-the-rules-a-bit.html

http://www.securityweek.com/nature-vs-nurture-bad-cybersecurity-our-dna

http://gizmodo.com/top-defense-contractor-left-sensitive-pentagon-files-on-1795669632

https://nakedsecurity.sophos.com/2017/06/02/onelogin-warns-that-attacker-could-be-able-to-decrypt-data/

Defensive Security Podcast Episode 191

https://arstechnica.com/security/2017/05/windows-7-not-xp-was-the-reason-last-weeks-wcry-worm-spread-so-widely/

http://www.publictechnology.net/articles/news/nhs-cyber-attack-forces-week-long-council-email-block

https://www.washingtonpost.com/business/technology/nsa-officials-worried-about-the-day-its-potent-hacking-tool-would-get-loose-then-it-did/2017/05/16/50670b16-3978-11e7-a058-ddbb23c75d82_story.html

https://www.grahamcluley.com/companies-keeping-bitcoin-hand-case-ransomware-attacks/

http://www.eweek.com/security/zomato-docusign-breaches-reveal-common-security-risks

Defensive Security Podcast Episode 189

https://www.wsj.com/articles/cybersecurity-startup-tanium-exposed-california-hospitals-network-in-demos-without-permission-1492624287

95% of enterprise risk assessments find employees using TOR, private VPNs to bypass security, report says

http://www.csoonline.com/article/3191286/security/most-employees-willing-to-share-sensitive-information-survey-says.html

https://www.bleepingcomputer.com/news/security/over-36-000-computers-infected-with-nsas-doublepulsar-malware/

Defensive Security Podcast Episode 188

https://arstechnica.com/security/2017/04/purported-shadow-brokers-0days-were-in-fact-killed-by-mysterious-patch/

https://www.bleepingcomputer.com/news/security/former-sysadmin-accused-of-planting-time-bomb-in-companys-database/

http://www.computerworld.com/article/3189059/security/what-prevents-breaches-process-technology-or-people-one-answer-is-pc-and-one-is-right.html

http://www.csoonline.com/article/3187422/network-security/report-30-of-malware-is-zero-day-missed-by-legacy-antivirus.amp.html

How Hackers Hijacked a Bank’s Entire Online Operation

http://news.softpedia.com/news/two-laptops-with-hong-kong-s-3-7-million-voters-data-stolen-514346.shtml

Threat Brief: Credential Theft – The Keystone of the Shamoon 2 Attacks

Defensive Security Podcast Episode 187

http://www.itworld.com/article/3182431/security/some-https-inspection-tools-might-weaken-security.html

https://www.bleepingcomputer.com/news/legal/former-it-admin-accused-of-leaving-backdoor-account-accessing-it-700-times/

http://www.securityweek.com/what-cisos-can-learn-er-doctors

http://www.csoonline.com/article/3180762/data-breach/inside-the-russian-hack-of-yahoo-how-they-did-it.html

https://arstechnica.com/security/2017/03/microsofts-silence-over-unprecedented-patch-delay-doesnt-smell-right/